Training Solutions for 

Countries | States | Federal and State Agencies | School & Colleges

HummingBirds, Consulting is committed to providing quality and substantive learning to their participants. Our deep understanding and input from industry experts has helped us design our programs towards job readiness.

Our knowledgeable trainers guide students from basic to intermediate skills in select enterprise applications applied at universities along with instructional technologies and soft skills. The curriculum is customized to teach the students towards target jobs with support from personality and IT counselors.

We are part of the community and its associations. We are working with businesses and chambers to have impressionable speakers to be role models and guides to real life opportunities.

HummingBirds Consulting has partnered with a leading software company on subjects that will help them achieve their goals.

It is easy to join our monthly training programs. We are committed in helping you achieve your objective in getting a job and retaining it. Our resource center is available for our students and employees to call for advice and directions to overcome challenges while working at their jobs.

HummingBirds Consulting has successfully grown over the past five years and is recognized for career readiness program and entrepreneurship.

Certification Courses

Description: The course provides an introduction to computer concepts, applications, and basics of the Internet. Topics include hardware, software, networking, website design, and using a software suite, which includes word processing, spreadsheet, database, and presentation software.

Objective: Upon completion of this course, participants will be able to:
– Identify and discuss major hardware components
– Know the fundamentals of network and how the Internet works
– Understand the features of system software and application software
– Know how to use application software such as word processing, spreadsheet, database management, and presentation graphics
– Create a simple website using HTML

Description: A+ certification course is based on A+ curriculum related to exams 220-901 and 220-902. The course introduces basic hardware and software, including installing operating systems, hard drives, motherboard, and input / output devices. Participants learn how to maintain and optimize operating system and troubleshoot hardware problems. Introduces participants to different networking types, basics of security, and mobile devices.

Objective: Upon completion of this course, the participants will be able to:
– Know how various hardware components interact with each other
– Support processors and upgrade memory
– Troubleshoot computers
– Support hard drives and other storage devices
– Install Windows and support I/O devices
– Perform basic networking
– Discuss security threats

Description: Discusses OSI model, how computers find each other on networks, and how data is transported over networks. Introduces basic cabling and network map that can be used in network troubleshooting. Examines how nodes exchange wireless signals and identifies potential obstacles to successful wireless transmission. Explores cloud computing, remote access, and network’s performance due to unified communications. Topics such as network segmentation, virtualization, and wide area network are elaborated.

Objective: Upon completion of this course, the participants will be able to:
– Perform basic network troubleshooting
– Know the features and how to work on Network Operating Systems
– Perform basics of network installation and upgrading
– Manage user accounts and passwords
– Perform remote access and administration

Description: Introduces to application and network-based attacks, including server-side web application attacks, client-server application attacks, impartial overflow attacks, DoS, interception, poisoning, and attacks on access rights. Discusses securing the devices, operating system, and application hardening and patch management. Crypotographic algorithms such as hash, symmetric, and asymmetric and digital signatures are discussed.

Objective: Upon completion of this course, the participants will be able to:
– Evaluate network design and components, including firewall and IDS
– Discuss anti-malware, privacy, and integrity issues
– Discuss security infrastructure such as access control, authentication, and auditing
– Explain security involved in remote access, wired, wireless, and cloud communications
– Demonstrate knowledge of basic cryptographic algorithms
– Create incident report, disaster recovery, and business continuity plans

We prepare participants to apply technical skills in cybersecurity careers. Participants will learn career options in the field and about how to enter in this exciting profession.

Other Courses

Introducing Sec SDLC (Security System Development Life Cycle) with emphasis on security investigation, security, design, implementation, maintenance, and change.

Introduces to basic hardware and software, including installing operating systems, hard drives, motherboard, and input / output devices. Students learn how to maintain and optimize operating system and troubleshoot hardware problems. Introduces students to different networking types, mobile devices, and virtualization.

Discusses OSI model, how computers find each other on networks, and how data is transported over networks. Introduces basic cabling and network map that can be used in network troubleshooting. Examines how nodes exchange wireless signals and identifies potential obstacles to successful wireless transmission. Explores cloud computing, remote access, and network’s performance due to unified communications. Topics such as network segmentation, virtualization, wide area network, and SCADA systems are elaborated.

Introduces information security terminology, attacks, and defenses. Discusses personal security, computer security, Internet security, mobile security, and workplace security.

ntroduces to application and network-based attacks, including server-side web application attacks, client-server application attacks, impartial overflow attacks, DoS, interception, poisoning, and attacks on access rights. Discusses securing the devices, operating system, and application hardening and patch management. Cryptographic algorithms such as hash, symmetric, and asymmetric are introduced.

Discusses digital certificates, PKI, key management, and cryptographic transport protocol, such as SSL, TLS, SSH, HTTPS, and IPsec. Introduces to NAT, NAC, DMZ, subnetting, WEP, WPS, WPA, WPA2, authentication services and account management.

Introduces professional codes of ethics. Explores “right to privacy” and legal and moral issues concerning privacy. Intellectual property, copyrights, patents, trademarks, copy protection, virus, intrusion, and plagiarism are discussed.

In-depth introduction to ethical hacking, foot printing, scanning, enumeration, system hacking, Trojans, backdoors, viruses, worms, sniffers, social engineering, phishing, DoS, buffer overflows, session hijacking, hacking web servers, web application vulnerability, web-based password cracking techniques, hacking web browsers, SQL injection, and hacking database servers.

In-depth introduction to linux hacking, Mac OS hacking, hacking routers, cable modems, and firewalls, hacking mobile phones, PDAs, and handheld devices, Bluetooth hacking, RFID hacking, and hacking USB devices.

In-depth introduction to hacking wireless networks, physical security, evading IDS, firewalls, and detecting honeypots, and cryptography.

In-depth introduction to computer investigation process, first responder procedures, incident handling, and investigative reports. Discusses file systems and hard disks, digital media devices, operating system forensics and boot processes. Includes application password crackers.

In-depth introduction to steganography, data acquisition and duplication, forensic investigation using EnCase and recovering deleted files and deleted partitions.

Investigation of network traffic, web attacks, router forensics, DoS attacks, Internet crime. Explores tracking e-mails and investigating e-mail crime, investigating corporate espionage, trademark and copyright infringement, and sexual harassment incidents. Investigating wireless attacks, iPod, and iPhone forensics.

Introduces to reconnaissance, scanning tools, sniffers, TCP/IP vulnerabilities, encryption and password cracking. Explores spoofing, session hijacking, hacking network devices, web and operating system vulnerabilities.

Discusses planning for organization readiness, contingency strategies for IR/DR/BC, incident response planning, detection, decision making, organizing and preparing CSIRT, response strategies, recovery and maintenance. Also explores disaster recovery preparation and implementation, operation and maintenance, and business continuity planning. Covers crisis management and international standards in IR/DR/BC.

Discusses the culture of higher education. Topics such as accepting personal responsibility, discovering self-motivation, mastering self-management, employing interdependence, gaining self-awareness, adopting life-long learning, developing emotional intelligence, and staying on course to your success are discussed.

READY TO FEEL SOME TRAINING MAGIC?

THE FIRST STEP IS CONNECTING.